by Jim Morrish, Founding Partner, Transforma Insights
This blog post originally appeared as a Transforma Insights blog post
Trustworthiness in the Internet of Things and Digital Transformation (DX) is a concept that has been pioneered by the Industrial Internet Consortium. It’s a really innovative concept in this context, and is destined to make much of today’s debate about simple ‘Security’ seem out of date.
What is Trustworthiness? Trustworthiness is essentially the degree to which an industrial system can be relied on to do what it should, and not to do things that it shouldn’t. Specifically, there are five main characteristics to be considered:
-
Safety is the condition of the system operating without causing unacceptable risk of physical injury or damage to the health of people, either directly, or indirectly as a result of damage to property or to the environment.
-
Security is the property of being protected from unintended or unauthorized access, change or destruction. Security concerns equipment, systems and information, ensuring availability, integrity and confidentiality of information.
-
Privacy is the right of individuals to control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.
-
Resilience is the ability of a system or component to maintain an acceptable level of service in the face of disruption. This includes the ability to recover lost capacity in a timely manner (using a more or less automated procedure), or to reassign workloads and functions.
-
Reliability is the ability of a system or component to perform its required functions under stated conditions for a specified period of time. This includes expected levels of performance, QoS, functional availability and accuracy.
Why is Trustworthiness an important concept? Much of the importance is due to the old IT (Information Technology)/OT (Operational Technology) convergence story. Historically, OT systems were designed to be resilient, reliable and very safe, whilst IT systems have been built to be secure, private and reasonably reliable. With the advent of IoT and DX, the requirements of IT and OT become intertwined, with conclusions of analyses undertaken in the IT domain influencing actions in the OT domain, and so new IT/OT-converged systems must meet the Trustworthiness considerations associated with each.
To give an example, it isn’t sufficient for a system controlling an industrial robot to only be highly ‘secure’ – we also need to ensure the safety of any staff that might be nearby the industrial robot. This could be achieved by placing software that limits the range of motion of an industrial robot on the robot itself, potentially overriding any instructions emanating from an IT environment, or by placing the same robot in a cage to stop staff getting into any areas where they might come into conflict with potential robot motions. There are many other possible approaches, and hybrid solutions that include pressure or proximity sensors on the robot are also relevant.
Often there will be trade-offs between the different characteristics of Trustworthiness, and other times actions taken to enhance system performance against Trustworthiness characteristic will enhance performance against another. An example of the former could be where priorities of individual privacy conflict with security of system access. An example of the latter could be the implementation of a back-up server site, which might enhance both the resilience and reliability of an industrial system.
Crucially, in all cases, all Trustworthiness considerations should be viewed in contention with a business case, and measured against accepted industry norms. In essence, it is easy to invest ‘too much’ in Trustworthiness, and in a way that negatively impacts business outcomes. More on this topic in later blogs.
This blog is based on content extracted from the Industrial Internet Consortium’s “Managing and Assessing Trustworthiness for IIoT in Practice” white paper, of which Jim Morrish is a co-author. The full white paper is available to download here.